Solved

Career development courses for Security

Posted on 2016-10-05
9
62 Views
Last Modified: 2016-10-23
Hi All,

i am looking to get more skills and even to a Master in Cyber Security.

Which course you would recommend so i could also use it on my Masters in Cyber Security degree?
0
Comment
Question by:mallony
  • 3
  • 3
  • 2
  • +1
9 Comments
 
LVL 13

Expert Comment

by:SIM50
ID: 41830044
What do you want to do in Security? This field is very broad and ranges from GRC to forensics.
0
 
LVL 61

Expert Comment

by:btan
ID: 41830284
Need experience and go for (ISC)2 CISSP or (ISACA) CISA that will set you in good pace and exposure for cyber security profession. Also SANS courses and degree are another you can check out esp on SANS GIAC certification
Many courses in the program use GIAC certifications as assessments of learning outcomes, and graduates of this degree program acquire more than seven GIAC certifications even before you graduate, including the GIAC Security Expert (GSE) certification, used as a capstone assessment.
https://www.sans.edu/about/faq#q1345
0
 
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 125 total points
ID: 41843446
OSCP is the only course I recommend, you get understanding you never will with CISSP/GSEC and others.
If you know how to use PC's, especially linux, you'll love the course, it's cheap too and includes the test in the price: https://www.offensive-security.com/information-security-certifications/oscp-offensive-security-certified-professional/
-rich
0
 
LVL 61

Expert Comment

by:btan
ID: 41843488
For hands-on, OSCP is good and CISSP / CISA is more on the professional "buy-in" for your prospective employer and personal career growth in the security community. Actually security conferences run the SANS courses and I do still see SANS course are pretty hands-on too e.g. GCIH, GPEN https://www.sans.org/courses/
0
Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

 
LVL 13

Expert Comment

by:SIM50
ID: 41843542
OP still didn't answer what he wants to do... Your suggestions just cover GRC and red team. What about the rest of the security field?
0
 

Author Comment

by:mallony
ID: 41851902
There is a flow chart with separate fields professional would work and their job position they would hold?
0
 
LVL 61

Assisted Solution

by:btan
btan earned 125 total points
ID: 41851944
Actually you may want to see this framework for cybersecurity training and scope of work, going into each scope of work, it states the KPI and the job. For e.g.

under the "Securely Provision" > "→ Information Assurance Compliance", it has its set of "Knowledge, Skills, and Abilities" (e.g. "Knowledge of IA principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)" etc) listed leading to "Tasks" (e.g. "Develop security compliance processes and/or audits for external services" etc) to perform and the "Related Job Titles" (e.g. Auditor etc)
https://niccs.us-cert.gov/workforce-development/cyber-security-workforce-framework
0
 
LVL 13

Accepted Solution

by:
SIM50 earned 250 total points
ID: 41851990
There is a flow chart with separate fields professional would work and their job position they would hold?

Not a flow chart but I think that's exactly what you are looking for.
https://tisiphone.net/2015/11/08/starting-an-infosec-career-the-megamix-chapters-4-5/
0
 

Author Closing Comment

by:mallony
ID: 41856374
Grea advice!
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Never store passwords in plain text or just their hash: it seems a no-brainier, but there are still plenty of people doing that. I present the why and how on this subject, offering my own real life solution that you can implement right away, bringin…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now